Sciweavers

667 search results - page 31 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
EMSOFT
2007
Springer
15 years 6 months ago
Optimal task placement to improve cache performance
Most recent embedded systems use caches to improve their average performance. Current timing analyses are able to compute safe timing guarantees for these systems, if tasks are ru...
Gernot Gebhard, Sebastian Altmeyer
ISPD
2003
ACM
151views Hardware» more  ISPD 2003»
15 years 5 months ago
Capturing crosstalk-induced waveform for accurate static timing analysis
We propose a method to capture crosstalk-induced noisy waveform for crosstalk-aware static timing analysis. The effects of capacitive coupling noise on timing are conventionally m...
Masanori Hashimoto, Yuji Yamada, Hidetoshi Onodera
FC
2004
Springer
80views Cryptology» more  FC 2004»
15 years 5 months ago
Practical Anonymity for the Masses with MorphMix
MorphMix is a peer-to-peer circuit-based mix network to provide practical anonymous low-latency Internet access for millions of users. The basic ideas of MorphMix have been publish...
Marc Rennhard, Bernhard Plattner
ASUNAM
2009
IEEE
15 years 4 months ago
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis
—Spam in social tagging systems introduced by some malicious participants has become a serious problem for its global popularizing. Some studies which can be deduced to static us...
Bo Liu, Ennan Zhai, Huiping Sun, Yelu Chen, Zhong ...
ACSW
2006
15 years 1 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...